phishing email (Abscent/

Why email phishing persists

One reason why bad actors use spoofing to steal sensitive information is they can. Despite all we know about practicing good cyber hygiene, spoofing works.

One of the most popular forms of spoofing is phishing, which the U.S. Computer Emergency Readiness Team defines as “an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques.”

Although phishers are using social media, instant messages, text messages and voice calls, they most commonly rely on email. That’s because of inherent flaws in how email was designed, Neil Wynne, principal and analyst for secure business enablement at Gartner, told GCN. Specifically, Simple Mail Transfer Protocol, the standard for sending and relaying email, is more than 30 years old and was not designed to authenticate senders or verify the integrity of received messages, he said via email.

“It is therefore easy to fake or ‘spoof’ where an email claims to come from,” Wynne said. As a result, it’s “trivial for an attacker to impersonate a trusted entity -- the underlying protocol that powers every email system simply doesn’t have an inherent way to defend against this.”

To demonstrate how easily phishing works, Al Bailey, a special agent at the Environmental Protection Agency’s Office of the Inspector General’s Office of Investigations, walked through a scam that affected EPA. To steal office supplies to resell for a profit, attackers in a foreign country compiled a list of about 1,700 EPA employee email addresses and sent a mass message out pretending to be part of the agency’s online security team.

“The email told these employees that the EPA was undergoing a system upgrade and that they had to reset their remote log-in credentials or else their email accounts would be frozen,” Bailey said in a 2017 podcast. “And of course, the email included a link that took these employees to a page that was supposedly the EPA’s remote log-in page.”

The employees entered their usernames and passwords into the fake page, and the attackers used those real credentials to buy thousands of dollars’ worth of office supplies.

Phishing is a major concern because it’s often the initial attack vector hackers use to compromise an organization, Wynne said. Government agencies are especially tempting targets because they’re seen as housing citizens' personally identifiable information, which hackers can use for a variety of scams.

“From an attacker’s perspective, they’re trying to trick the user into clicking on a malicious link or opening a malicious attachment so that they can ultimately establish a foothold,” he wrote. “What an attacker does from there will depend on their motive, which is most frequently monetization.”

For years, government agencies have been issuing reports -- intended for workers and the public at large, too -- describing what to look out for in phishing attacks. For instance, a 2013 document from the Securities and Exchange Commission warns that phishing emails may look like they come from legitimate sources, even copying a company or agency logo; the “from” line could contain the names of real people who work at the company; and URLs might look authentic. Additionally, phishing messages often include a sense of urgency or a threatened consequence if the recipient doesn’t act quickly.

A Federal Trade Commission article encourages people to be careful about opening attachments or clicking on links in emails, to look up websites and phone numbers through a web search rather than trusting those provided in the message and to call agencies directly to find out if the email is legit.

But phishing shows no sign of slowing down. In the second quarter of this year, phishing attacks worldwide totaled 233,040, compared with 180,577 in the fourth quarter of 2017, according to a report by the Anti-Phishing Working Group, an international coalition working to standardize the response to cybercrime.

Agencies can use multifactor authentication, keep security and antivirus software up-to-date and backup files to an external hard drive or cloud storage to limit damage. Because there is no silver bullet to avoiding falling for a phishing lure, the most effective way fight attacks is through a defense-in-depth approach covering technology, procedures and education.

Still, agencies remain vulnerable. “Technology can be used to help prevent users from being exposed to these attacks to begin with, but this will never be 100% effective,” Wynne said. In fact, “the human brain can be trained to detect malicious intent better than even the most advanced machine learning model. Of course, education isn’t foolproof either and some attacks are so well crafted that they are not only able to bypass advanced technical controls but can even trick the most well-educated users.”

That’s because phishers are masters of deception, appealing to even the least vulnerable computer users by using open source intelligence and personal information that has been disclosed in data breaches, which dramatically increases their likelihood of success, Wynne said. They also use timing to their advantage. For instance, anything related to paychecks typically goes out toward the middle or end of the month.

“How likely are you to question a flawlessly-crafted email that appears to be from a senior executive in your organization?” Wynne asked. “In many organizations, you wouldn’t question a request from a person at this level so there’s a fear that not complying will put your job in jeopardy. Combine all of this with a sense of urgency, and you have the perfect recipe to override a person’s better judgment.”

About the Author

Stephanie Kanowitz is a freelance writer based in northern Virginia.


  • Records management: Look beyond the NARA mandates

    Pandemic tests electronic records management

    Between the rush enable more virtual collaboration, stalled digitization of archived records and managing records that reside in datasets, records management executives are sorting through new challenges.

  • boy learning at home (Travelpixs/

    Tucson’s community wireless bridges the digital divide

    The city built cell sites at government-owned facilities such as fire departments and libraries that were already connected to Tucson’s existing fiber backbone.

Stay Connected